ZAP is a tool designed to make the web more secure, so we deliberately dont try to exploit potential vulnerabilities ;)
In this case ZAP is warning you that the script is hosted on what looks like a 3rd party service.
To exploit it you would need to compromise the third party, which you shouldnt try to do as part of a pentest unless you have the permission of that 3rd party :)
It is possible that JS fles are included from domains which no longer exist.
In that case you could register that domain and then create the JS file that is being included - if you can do that and if they dont protect it using CSP script-src then you can do all sorts of bad things!
Cheers,
Simon