Below are key resources documenting this recent monthly Microsoft Patch Tuesday release

https://isc.sans.edu/forums/diary/Microsoft+April+2020+Patch+Tuesday/26022/

https://blog.talosintelligence.com/2020/04/microsoft-patch-tuesday-april-2020.html

https://www.thezdi.com/blog/2020/4/14/the-april-2020-security-update-review

https://patchtuesdaydashboard.com/

https://portal.msrc.microsoft.com/en-us/security-guidance/summary

This month we got patches for 113 vulnerabilities total. According to Microsoft, three of them are being exploited (CVE-2020-1020CVE-2020-0938 and CVE-2020-0968)  and two were previously disclosed CVE-2020-1020 and CVE-2020-0935).    They exist in way the library improperly handles a specially-crafted multi-master font – Adobe Type 1 PostScript format.  The other exploited vulnerability (CVE-2020-0968) is remote code execution vulnerability in Internet Explorer. It consists in the way the scripting engine handles objects in memory.