Vulnerabilities are now sorted by identifier, in addition to package, in order to preserve the order in the generated constraints.
Vulnerabilities are now sorted by identifier, in addition to package, in order to preserve the order in the generated constraints.