First of all, as you've noticed, the first part is always the same. So if you have two ciphertext that are identical in the first bytes produced you can immediately see that this is the case. That's the first leak.
What you can do is to XOR the first block of ciphertext that differ. What you get back is a XOR of the plaintext of the two messages that were encrypted. You can then XOR any of the bits that you know and immediate get the plaintext of the other message at those locations. It's also possible to use known information to guess, e.g. if it is English then the XOR of characters A and B will produce output 0x03 as only the last two bits differ. Note that you can do this with any pair of ciphertext that you get. That way you can quickly get information about the blocks of plaintext.
It would of course help if you have an encryption oracle. In that case you can simply feed it guessed plaintext or plaintext that helps you with the XOR trick.
Now onto the things you cannot do.
First of all, the AES block cipher - or any known secure cipher - will not allow you to get the key even if you have multiple plaintext / ciphertext pairs (to the block cipher).
Secondly, you won't be able to guess the IV if it isn't indicated, as it is a plaintext block to the block cipher.
Finally, it is impossible to get to the plaintext when the previous block of ciphertext differs from all the others. In that case the block cipher generates what is basically random bytes, and you can therefore not retrieve any information about the corresponding plaintext block after it has been XOR'ed.

Image is Wikimedia Commons, by Gwenda.