Bondora was affected and fixed it and replaced their server SSL certificate on Wednesday night. They revoked their old certificate so that anyone who was able to use the vulnerability to steal Bondora's private key could not use the old certificate to impersonate them. It's now prudent to change passwords there.
Now is a bad time to be going and logging in to lots of places that have not been fixed because that just puts you at higher risk by putting your login information into RAM where it could be taken. Best to give it a week or so before mass password updating.
You can click on the names to check each one in this list, here's the decoding key for what the descriptions mean:
A/B/C/F etc is the overall SSl security rating from the checking service and any other comments it has to explain the rating. F means using known insecure things, roughly, even if not vulnerable to heartbleed.
not currently vulnerable: not vulnerable at the time I checked, says nothing about whether it was vulnerable in the past.
old certificate: either never vulnerable or not yet fully completed the work of fixing.
new certificate: certificate from after the fix became known. Probably used to be vulnerable but only probably.
assetzcapital.co.uk: B not currently vulnerable, old certificate
auxmoney.com@ A- not currently vulnerable, old certificate
Bondora.com: A+ not vulnerable any more, was vulnerable before Wednesday, new certificate
communitae.com: A not currently vulnerable, new certificate
finansowo.pl: A- not currently vulnerable, old certificate
fixura.com: A- not currently vulnerable, old certificate
fixura.co.uk: A- not currently vulnerable, old certificate
folk-folk.com: F certificate mismatch with domain, certificate issued to secure33.prositehosting.co.uk. not currently vulnerable, old certificate
fundingcircle.com: B not currently vulnerable, old certificate
fundingknight.com: B not currently vulnerable, old certificate
fundingsecure.com: A- not currently vulnerable, old certificate
geldvoorelkaar.nl: F, uses obsolete and insecure SSL2, not currently vulnerable, old certificate
Kokos.pl: B, not currently vulnerable, old certificate
lendingclub.com: A-, not currently vulnerable, old certificate
myc4.com: F, uses obsolete and insecure SSL2, not currently vulnerable, old certificate
pret-dunion.fr: B, uses only older protocols, not currently vulnerable, old certificate
prosper.com: B, not currently vulnerable, old certificate
ratesetter.com: F but probably not relevant, see next entry
members.ratesetter.com: F, uses obsolete and insecure SSL2, not currently vulnerable, old certificate
rebuildingsociety.com: B, not currently vulnerable, old certificate
smartika.it: F, APPEARS VULNERABLE TO HEARTBLEED TODAY, old certificate
smava.de: A-, not currently vulnerable, old certificate
thincats.com: C, vulnerable to CRIME attack, only older protocols, no secure negotiation support, not currently vulnerable, old certificate
wellesley.co.uk: F, supports anonymous suites, not currently vulnerable, old certificate
Zopa: B, not currently vulnerable, old certificate.
Note that the test result descriptions come from the testing service, not me except to summarise them.
It's also worth noting that except in a few cases the test uses the obvious server name and they might use more secure versions for logins and member sessions than for the main site. Ratesetter did this sort of thing, not having SSL for the main site but for logins and presumably other things. Where I did followup tests I left just the main link so you can see what I did to get to a testable server.