Using LLMs for Security Advisory Investigations: How Far are We? | IEEE Conference Publication | IEEE Xplore