Sub-sort vulnerabilities using compare key
Sort vulnerabilities by severity (desc), sub-sort by compare key (asc). This makes ordering deterministic because compare keys are unique and mandatory.
Sort vulnerabilities by severity (desc), sub-sort by compare key (asc). This makes ordering deterministic because compare keys are unique and mandatory.