This is a test site to check whether your browser verifies the signature on the ServerKeyExchange SSL/TLS message.
Please see agl's writeup for a full description of the bug.
Apple has released official iOS updates that resolve this issue.
A third party patch for OS X, which I have not reviewed and cannot vouch for, is available from i0n1c.
Please wait while we test your browser...
Your browser aborted loading the test image upon seeing an invalid ServerKeyExchange message.
This means your browser is not vulnerable to the bug, however if you're on an Apple device make sure you test Safari.
YOUR BROWSER IS VULNERABLE, PATCH IMMEDIATELY!
An attacker able to actively intercept your network connections (this is possible on most WiFi networks) can freely snoop on you, for example when you log into your bank account. Please check your browser and operating system for security updates and apply them right away. Other apps you have installed probably use the same SSL library and are also vulnerable - simply switching browsers will not fully protect you.
This site works by using javascript to inject a hidden image with event hooks to show the appropriate message depending on whether the image loads successfully. The image is hosted on a web server which has been modified to make its ServerKeyExchange message signatures invalid. The invalid signature will cause the connection to abort when the signature is checked, provided that the signature is actually verified.