We're getting reports of client applications that are vulnerable to the heartbleed issue. Just as with server applications, these client applications are dependent on vulnerable versions of OpenSSL.
This vulnerability on the client side has the potential to be much longer-lived than on servers.
This combines the problem of the specific heartbleed vulnerability with the problem of embedded devices that may never be updated. Or devices that are updated by vendors for a year or two after release, then abandoned when the new model comes out - home routers and TV sets are great examples of this situation, but so are medical devices and Android phones, etc.