This document discusses blind SQL injection vulnerabilities. It explains that even if error messages are disabled, applications may still be vulnerable to blind SQL injection attacks where the attacker can make true/false queries to extract information from the database. It provides an example of how an attacker could extract the name of a database table one character at a time using such queries. The document recommends moving all SQL statements to stored procedures to prevent user input from modifying the syntax of queries.