Various list fixes.

Change-Id: I642ce8b28201e050ffe66b7c2d4032f17ec72a41
diff --git a/src/main/markdown/articles/security_for_gwt_applications.md b/src/main/markdown/articles/security_for_gwt_applications.md
index 55eb4b1..6363aaa 100644
--- a/src/main/markdown/articles/security_for_gwt_applications.md
+++ b/src/main/markdown/articles/security_for_gwt_applications.md
@@ -12,15 +12,15 @@
 This article is a primer on JavaScript attacks, intended for GWT developers. The first portion describes the major classes of attacks against JavaScript in general terms that are applicable to any AJAX framework. After that background information on the attacks, the second portion describes how to secure your GWT applications against them.
 
 1.  [Part 1: JavaScript Vulnerabilities](#vulnerabilities)
-
-1.  [Leaking Data](#leaking)
-2.  [Cross-Site Scripting](#cross-site)
-3.  [Forging Requests](#forging)
-4.  [JSON and XSRF](#json-xsrf)2.  [Part 2: How GWT Developers Can Fight Back](#fight)
-
-1.  [XSS and GWT](#xss)
-2.  [XSRF and GWT](#xsrf)
-3.  [JSON and GWT](#json)3.  [Conclusion](#conclusion)
+    1.  [Leaking Data](#leaking)
+    2.  [Cross-Site Scripting](#cross-site)
+    3.  [Forging Requests](#forging)
+    4.  [JSON and XSRF](#json-xsrf)
+2.  [Part 2: How GWT Developers Can Fight Back](#fight)
+    1.  [XSS and GWT](#xss)
+    2.  [XSRF and GWT](#xsrf)
+    3.  [JSON and GWT](#json)
+3.  [Conclusion](#conclusion)
 
 ## Part 1: JavaScript Vulnerabilities <a id="vulnerabilities"></a>
 
diff --git a/src/main/markdown/doc/latest/DevGuideHtml5.md b/src/main/markdown/doc/latest/DevGuideHtml5.md
index 339ed9a..f24a49d 100644
--- a/src/main/markdown/doc/latest/DevGuideHtml5.md
+++ b/src/main/markdown/doc/latest/DevGuideHtml5.md
@@ -11,4 +11,5 @@
 
 1.  [Client-side Storage](DevGuideHtml5Storage.html) -- Use LocalStorage, SessionStorage, and monitor StorageEvents
 2.  [Canvas](/javadoc/latest/index.html?com/google/gwt/canvas/dom/client/package-summary.html) -- Add visualizations using Canvas (Javadoc)
-3.  [Audio](/javadoc/latest/com/google/gwt/media/client/Audio.html) -- Use Audio widgets (Javadoc)4.  [Video](/javadoc/latest/com/google/gwt/media/client/Video.html) -- Use Video widgets (Javadoc)
+3.  [Audio](/javadoc/latest/com/google/gwt/media/client/Audio.html) -- Use Audio widgets (Javadoc)
+4.  [Video](/javadoc/latest/com/google/gwt/media/client/Video.html) -- Use Video widgets (Javadoc)
diff --git a/src/main/markdown/doc/latest/DevGuideSecuritySafeHtml.md b/src/main/markdown/doc/latest/DevGuideSecuritySafeHtml.md
index 5367eea..bb660f7 100644
--- a/src/main/markdown/doc/latest/DevGuideSecuritySafeHtml.md
+++ b/src/main/markdown/doc/latest/DevGuideSecuritySafeHtml.md
@@ -47,9 +47,11 @@
     1.  [Prefer Plain-Text Widgets](#Prefer_Plain_Text)
     2.  [Use UiBinder for Declarative Layout](#Avoid_ad_hoc_generation_of_HTML_)
     3.  [Use the SafeHtml Type to Represent XSS-Safe HTML](#Use_the_SafeHtml_type)
-    4.  [Creating SafeHtml Values](#Creating_SafeHtml_Values)3.  [Coding Guidelines for Widget Developers](#Coding_Guidelines_for_Widget_Developers)
-1.  [Provide SafeHtml Methods and Constructors](#Provide_SafeHtml)
-2.  ["Unwrap" SafeHtml Close to the Value's Use](#Unwrap_SafeHtml)4.  [Caveats and Limitations](#Caveats and Limitations)
+    4.  [Creating SafeHtml Values](#Creating_SafeHtml_Values)
+3.  [Coding Guidelines for Widget Developers](#Coding_Guidelines_for_Widget_Developers)
+    1.  [Provide SafeHtml Methods and Constructors](#Provide_SafeHtml)
+    2.  ["Unwrap" SafeHtml Close to the Value's Use](#Unwrap_SafeHtml)
+4.  [Caveats and Limitations](#Caveats_and_Limitations)
 
 ## Coding Guidelines<a id="Coding_guidelines"></a>
 
@@ -572,7 +574,7 @@
 straightforward, but in more complex, real-world code this a potentially time
 consuming and error prone process.  
 
-## Caveats and Limitations<a id="Caveats and Limitations"></a>
+## Caveats and Limitations<a id="Caveats_and_Limitations"></a>
 
 Comprehensive and consistent use of `SafeHtml` during development of
 a GWT application can substantially reduce the incidence of XSS vulnerabilities
diff --git a/src/main/markdown/doc/latest/DevGuideUiCellWidgets.md b/src/main/markdown/doc/latest/DevGuideUiCellWidgets.md
index ae3be90..96e6ea5 100644
--- a/src/main/markdown/doc/latest/DevGuideUiCellWidgets.md
+++ b/src/main/markdown/doc/latest/DevGuideUiCellWidgets.md
@@ -886,7 +886,8 @@
 
 **To Update the Database from a CellTable:**
 
-1.  Create a class that implements [FieldUpdater](/javadoc/latest/com/google/gwt/cell/client/FieldUpdater.html) to accept a new data value and send it to your database.2.  Set the FieldUpdater in the Column by calling  [column.setFieldUpdater(fieldUpdater)](/javadoc/latest/com/google/gwt/user/cellview/client/Column.html#setFieldUpdater\(com.google.gwt.cell.client.FieldUpdater\)).
+1.  Create a class that implements [FieldUpdater](/javadoc/latest/com/google/gwt/cell/client/FieldUpdater.html) to accept a new data value and send it to your database.
+2.  Set the FieldUpdater in the Column by calling  [column.setFieldUpdater(fieldUpdater)](/javadoc/latest/com/google/gwt/user/cellview/client/Column.html#setFieldUpdater\(com.google.gwt.cell.client.FieldUpdater\)).
 
 **Code Example** - An example is available at [CellTableFieldUpdaterExample.java](https://gwt.googlesource.com/gwt/+/master/user/javadoc/com/google/gwt/examples/cellview/CellTableFieldUpdaterExample.java).