"Fortunately many large consumer sites are saved by their conservative choice of SSL/TLS termination equipment and software. Ironically smaller and more progressive services or those who have upgraded to latest and best encryption will be affected most."
There doesn't appear to be any up-to-the-minute current registry that I could find of sites that are affected on the server. The scan posted on github is fairly out of date at this point, and from what I can tell only takes the homepage into consideration, not sites that only forward to https for things like login / checkout.
Here is the best one-off checker I could find (server side):
Also, it may not be necessary to update Chrome/Firefox, based on the following language on the security stackexchange site:
"Chrome (all platforms except Android): Probably unaffected (uses NSS)"
"Chrome on Android: 4.1.1 may be affected (uses OpenSSL). Source. 4.1.2 should be unaffected, as it is compiled with heartbeats disabled."
"Mozilla products (e.g. Firefox, Thunderbird, SeaMonkey, Fennec): Probably unaffected, all use NSS"
The potential vulnerability of clients is discussed here:
- https://www.openssl.org/news/secadv_20140407.txt (language: "client or server")
"Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services."
My guess is that curl going to an https site would be affected, or other programs that use OpenSSL. Maybe a chat client or if programs are downloading their own "auto-updates" over SSL. Those are the only kinds of things that come to mind right now.