Vulnerability-Affected Versions Identification: 

How Far Have We Come?