Learn what are file inclusion vulnerabilities, what types of file inclusion vulnerabilities exist and how do they work.