ExploitDB Improver Pipeline: Fetch ExploitDB data, iterate over it to find the vulnerability with the specified alias, and create or update the ref and ref-type accordingly.