51310 is not a real exploit
The exploit with title HospitalRun 1.0.0-beta - Local Root Exploit for macOS
is an april fool's joke and not a real exploit. Examining the code for the exploit in macos/local/51310.rb
reveals that the buffer, payload and nopsled are in fact ascii text and not actually bytes.
There can be no local root exploit since the software does not run as root, nor does part of it run as root. There are no SETUID binaries in the application. Not a single file of the software is owned by root either. As such it is impossible for there to be a local privilege escalation.
The original article discussing it here, is obviously fake. The original poster admitted as such here.
As a tool for security researchers, penetration testers and people trying to find safe software and mitigations for security exploits, it is wasting everybodies time if fake vulnerabilities end up in this database.
As such I request this to be removed from exploitdb since it is not a real exploit.