From Attack Descriptions to Vulnerabilities: A Sentence Transformer-Based Approach