Describir: Detecting Command Injection and Cross-site Scripting Vulnerabilities Using Graph Representations