SECURITY: This fixes a vulnerability where w3m fails to escape HTML
tags in frame contents, so malicious frame HTML can deceive you and
access your local files, cookies and so on.
Hironori Sakamoto found some vulnerabilities in w3m support scripts,
such as multipart.cgi, w3mman2html.cgi and w3mhelp.cgi. Attacker
could run arbitrary commands on user's machine with user's privilege
by using malicious html pages.
Radical pruning to make this port manageable again:
- Remove image and m17n flavors. The corresponding functionality
may eventually return in some other form.
- Rename kanji flavor to "japanese".