Hironori Sakamoto found some vulnerabilities in w3m support scripts,
such as multipart.cgi, w3mman2html.cgi and w3mhelp.cgi. Attacker
could run arbitrary commands on user's machine with user's privilege
by using malicious html pages.
Radical pruning to make this port manageable again:
- Remove image and m17n flavors. The corresponding functionality
may eventually return in some other form.
- Rename kanji flavor to "japanese".