Bugs in Mfa, password reset, oauth integration, and “signature check” flows are hot spots.
If a program is using cryptographic primitives, this often leads to vulnerabilities.