Also F5 or Citrix: some of their core security products had 90s-style C exploits and other signs of development practices well behind the times - roughly at the level of going to surgery and seeing your surgeon not washing their hands in the bathroom.
https://www.cisa.gov/guidance-addressing-citrix-netscaler-ad...
https://www.mandiant.com/resources/blog/session-hijacking-ci...
https://www.fortinet.com/blog/threat-research/defending-agai...
https://www.cisa.gov/news-events/cybersecurity-advisories/aa...